Information Security Training

  • The participant will be able to describe the importance of and requirements for information security focusing on confidentiality, integrity, and availability of information. They will be able define various types of attacks, and how they’re spread and executed, evaluate and implement methods available to protect information systems, including operating system features and utilities
  • Participants shall design secure network topologies utilizing physical security, firewalls, VPNs, and other protection features, as well monitor and log activity on computers and networks using intrusion detection and prevention systems
  • They can evaluate common open source and commercial security applications and apply research skills to identify and correct potential security vulnerabilities

5 Days

A basic exposure to Security concepts may help but is not required for this training program.

  • Attacks and threats to information systems
  • Risk assessment
  • Hardening operating systems and networks
  • Malicious software
  • Securing and protecting data and storage
  • Cryptography
  • Authentication and access control
  • Network and internet security
  • Firewalls, VPNs, and intrusion detection systems
  • Security testing, logging, and auditing
  • Incident investigation and management